1 /* 2 * Copyright (c) 2000-2019 Apple Inc. All rights reserved. 3 * 4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ 5 * 6 * This file contains Original Code and/or Modifications of Original Code 7 * as defined in and that are subject to the Apple Public Source License 8 * Version 2.0 (the 'License'). You may not use this file except in 9 * compliance with the License. The rights granted to you under the License 10 * may not be used to create, or enable the creation or redistribution of, 11 * unlawful or unlicensed copies of an Apple operating system, or to 12 * circumvent, violate, or enable the circumvention or violation of, any 13 * terms of an Apple operating system software license agreement. 14 * 15 * Please obtain a copy of the License at 16 * http://www.opensource.apple.com/apsl/ and read it before using this file. 17 * 18 * The Original Code and all software distributed under the License are 19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER 20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, 21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, 22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. 23 * Please see the License for the specific language governing rights and 24 * limitations under the License. 25 * 26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ 27 */ 28 29 #ifndef _KERN_DEBUG_H_ 30 #define _KERN_DEBUG_H_ 31 32 #include <kern/kcdata.h> 33 34 #include <sys/appleapiopts.h> 35 #include <sys/cdefs.h> 36 #include <stdint.h> 37 #include <stdarg.h> 38 #include <uuid/uuid.h> 39 #include <mach/boolean.h> 40 #include <mach/kern_return.h> 41 #include <mach/vm_types.h> 42 #include <kern/panic_call.h> 43 44 #ifdef XNU_KERNEL_PRIVATE 45 #include <kern/percpu.h> 46 #include <kern/upsi.h> 47 #else 48 #include <TargetConditionals.h> 49 #endif 50 51 __BEGIN_DECLS 52 53 #ifdef __APPLE_API_PRIVATE 54 #ifdef __APPLE_API_UNSTABLE 55 56 struct thread_snapshot { 57 uint32_t snapshot_magic; 58 uint32_t nkern_frames; 59 uint32_t nuser_frames; 60 uint64_t wait_event; 61 uint64_t continuation; 62 uint64_t thread_id; 63 uint64_t user_time; 64 uint64_t system_time; 65 int32_t state; 66 int32_t priority; /* static priority */ 67 int32_t sched_pri; /* scheduled (current) priority */ 68 int32_t sched_flags; /* scheduler flags */ 69 char ss_flags; 70 char ts_qos; /* effective qos */ 71 char ts_rqos; /* requested qos */ 72 char ts_rqos_override; /* requested qos override */ 73 char io_tier; 74 /* 75 * In microstackshots, the low two bytes are the start of the first async 76 * frame in the thread's user space call stack. If the call stack lacks 77 * async stack frames, it's `UINT16_MAX`. 78 */ 79 char _reserved[3]; /* pad for 4 byte alignement packing */ 80 81 /* 82 * I/O Statistics 83 * XXX: These fields must be together 84 */ 85 uint64_t disk_reads_count; 86 uint64_t disk_reads_size; 87 uint64_t disk_writes_count; 88 uint64_t disk_writes_size; 89 uint64_t io_priority_count[STACKSHOT_IO_NUM_PRIORITIES]; 90 uint64_t io_priority_size[STACKSHOT_IO_NUM_PRIORITIES]; 91 uint64_t paging_count; 92 uint64_t paging_size; 93 uint64_t non_paging_count; 94 uint64_t non_paging_size; 95 uint64_t data_count; 96 uint64_t data_size; 97 uint64_t metadata_count; 98 uint64_t metadata_size; 99 /* XXX: I/O Statistics end */ 100 101 uint64_t voucher_identifier; /* obfuscated voucher identifier */ 102 uint64_t total_syscalls; 103 char pth_name[STACKSHOT_MAX_THREAD_NAME_SIZE]; 104 } __attribute__((packed)); 105 106 /* old, non kcdata format */ 107 struct task_snapshot { 108 uint32_t snapshot_magic; 109 int32_t pid; 110 uint64_t uniqueid; 111 uint64_t user_time_in_terminated_threads; 112 uint64_t system_time_in_terminated_threads; 113 uint8_t shared_cache_identifier[16]; 114 uint64_t shared_cache_slide; 115 uint32_t nloadinfos; 116 int suspend_count; 117 int task_size; /* pages */ 118 int faults; /* number of page faults */ 119 int pageins; /* number of actual pageins */ 120 int cow_faults; /* number of copy-on-write faults */ 121 uint32_t ss_flags; 122 /* 123 * In microstackshots, `p_start_sec` is actually the resource coalition ID 124 * that this thread belongs to. 125 */ 126 uint64_t p_start_sec; /* from the bsd proc struct */ 127 /* 128 * In microstackshots, `p_stat_usec` is actually the resource coalition ID 129 * that this thread is doing work on behalf of. 130 */ 131 uint64_t p_start_usec; /* from the bsd proc struct */ 132 133 /* 134 * We restrict ourselves to a statically defined 135 * (current as of 2009) length for the 136 * p_comm string, due to scoping issues (osfmk/bsd and user/kernel 137 * binary compatibility). 138 */ 139 char p_comm[17]; 140 uint32_t was_throttled; 141 uint32_t did_throttle; 142 uint32_t latency_qos; 143 /* 144 * I/O Statistics 145 * XXX: These fields must be together. 146 */ 147 /* 148 * In microstackshots, `disk_reads_count` is actually 149 * the full 64-bits of ss_flags. 150 */ 151 uint64_t disk_reads_count; 152 uint64_t disk_reads_size; 153 uint64_t disk_writes_count; 154 uint64_t disk_writes_size; 155 uint64_t io_priority_count[STACKSHOT_IO_NUM_PRIORITIES]; 156 uint64_t io_priority_size[STACKSHOT_IO_NUM_PRIORITIES]; 157 uint64_t paging_count; 158 uint64_t paging_size; 159 uint64_t non_paging_count; 160 uint64_t non_paging_size; 161 uint64_t data_count; 162 uint64_t data_size; 163 uint64_t metadata_count; 164 uint64_t metadata_size; 165 /* XXX: I/O Statistics end */ 166 167 uint32_t donating_pid_count; 168 } __attribute__ ((packed)); 169 170 171 172 struct micro_snapshot { 173 uint32_t snapshot_magic; 174 uint32_t ms_cpu; /* cpu number this snapshot was recorded on */ 175 uint64_t ms_time; /* time at sample (seconds) */ 176 uint64_t ms_time_microsecs; 177 uint8_t ms_flags; 178 uint16_t ms_opaque_flags; /* managed by external entity, e.g. fdrmicrod */ 179 } __attribute__ ((packed)); 180 181 182 /* 183 * mirrors the dyld_cache_header struct defined in dyld_cache_format.h from dyld source code 184 */ 185 struct _dyld_cache_header { 186 char magic[16]; // e.g. "dyld_v0 i386" 187 uint32_t mappingOffset; // file offset to first dyld_cache_mapping_info 188 uint32_t mappingCount; // number of dyld_cache_mapping_info entries 189 uint32_t imagesOffset; // file offset to first dyld_cache_image_info 190 uint32_t imagesCount; // number of dyld_cache_image_info entries 191 uint64_t dyldBaseAddress; // base address of dyld when cache was built 192 uint64_t codeSignatureOffset;// file offset of code signature blob 193 uint64_t codeSignatureSize; // size of code signature blob (zero means to end of file) 194 uint64_t slideInfoOffset; // file offset of kernel slid info 195 uint64_t slideInfoSize; // size of kernel slid info 196 uint64_t localSymbolsOffset; // file offset of where local symbols are stored 197 uint64_t localSymbolsSize; // size of local symbols information 198 uint8_t uuid[16]; // unique value for each shared cache file 199 uint64_t cacheType; // 0 for development, 1 for production 200 uint32_t branchPoolsOffset; // file offset to table of uint64_t pool addresses 201 uint32_t branchPoolsCount; // number of uint64_t entries 202 uint64_t accelerateInfoAddr; // (unslid) address of optimization info 203 uint64_t accelerateInfoSize; // size of optimization info 204 uint64_t imagesTextOffset; // file offset to first dyld_cache_image_text_info 205 uint64_t imagesTextCount; // number of dyld_cache_image_text_info entries 206 uint64_t dylibsImageGroupAddr;// (unslid) address of ImageGroup for dylibs in this cache 207 uint64_t dylibsImageGroupSize;// size of ImageGroup for dylibs in this cache 208 uint64_t otherImageGroupAddr;// (unslid) address of ImageGroup for other OS dylibs 209 uint64_t otherImageGroupSize;// size of oImageGroup for other OS dylibs 210 uint64_t progClosuresAddr; // (unslid) address of list of program launch closures 211 uint64_t progClosuresSize; // size of list of program launch closures 212 uint64_t progClosuresTrieAddr;// (unslid) address of trie of indexes into program launch closures 213 uint64_t progClosuresTrieSize;// size of trie of indexes into program launch closures 214 uint32_t platform; // platform number (macOS=1, etc) 215 uint32_t formatVersion : 8,// dyld3::closure::kFormatVersion 216 dylibsExpectedOnDisk : 1, // dyld should expect the dylib exists on disk and to compare inode/mtime to see if cache is valid 217 simulator : 1, // for simulator of specified platform 218 locallyBuiltCache : 1, // 0 for B&I built cache, 1 for locally built cache 219 padding : 21; // TBD 220 }; 221 222 /* 223 * mirrors the dyld_cache_image_text_info struct defined in dyld_cache_format.h from dyld source code 224 */ 225 struct _dyld_cache_image_text_info { 226 uuid_t uuid; 227 uint64_t loadAddress; // unslid address of start of __TEXT 228 uint32_t textSegmentSize; 229 uint32_t pathOffset; // offset from start of cache file 230 }; 231 232 233 enum micro_snapshot_flags { 234 /* 235 * (Timer) interrupt records are no longer supported. 236 */ 237 kInterruptRecord = 0x01, 238 /* 239 * Timer arming records are no longer supported. 240 */ 241 kTimerArmingRecord = 0x02, 242 kUserMode = 0x04, /* interrupted usermode, or armed by usermode */ 243 kIORecord = 0x08, 244 kPMIRecord = 0x10, 245 kMACFRecord = 0x20, /* armed by MACF policy */ 246 kKernelThread = 0x40, /* sampled a kernel thread */ 247 }; 248 249 /* 250 * Flags used in the following assortment of snapshots. 251 */ 252 enum generic_snapshot_flags { 253 kUser64_p = 0x1, /* Userspace uses 64 bit pointers */ 254 kKernel64_p = 0x2 /* The kernel uses 64 bit pointers */ 255 }; 256 257 #define VM_PRESSURE_TIME_WINDOW 5 /* seconds */ 258 259 __options_decl(stackshot_flags_t, uint64_t, { 260 STACKSHOT_GET_DQ = 0x01, 261 STACKSHOT_SAVE_LOADINFO = 0x02, 262 STACKSHOT_GET_GLOBAL_MEM_STATS = 0x04, 263 STACKSHOT_SAVE_KEXT_LOADINFO = 0x08, 264 /* 265 * 0x10, 0x20, 0x40 and 0x80 are reserved. 266 * 267 * See microstackshot_flags_t whose members used to be part of this 268 * declaration. 269 */ 270 STACKSHOT_ACTIVE_KERNEL_THREADS_ONLY = 0x100, 271 STACKSHOT_GET_BOOT_PROFILE = 0x200, 272 STACKSHOT_DO_COMPRESS = 0x400, 273 /* Now on by default/unused */ 274 STACKSHOT_SAVE_IMP_DONATION_PIDS = 0x2000, 275 STACKSHOT_SAVE_IN_KERNEL_BUFFER = 0x4000, 276 STACKSHOT_RETRIEVE_EXISTING_BUFFER = 0x8000, 277 STACKSHOT_KCDATA_FORMAT = 0x10000, 278 STACKSHOT_ENABLE_BT_FAULTING = 0x20000, 279 STACKSHOT_COLLECT_DELTA_SNAPSHOT = 0x40000, 280 /* Include the layout of the system shared cache */ 281 STACKSHOT_COLLECT_SHAREDCACHE_LAYOUT = 0x80000, 282 /* 283 * Kernel consumers of stackshot (via stack_snapshot_from_kernel) can ask 284 * that we try to take the stackshot lock, and fail if we don't get it. 285 */ 286 STACKSHOT_TRYLOCK = 0x100000, 287 STACKSHOT_ENABLE_UUID_FAULTING = 0x200000, 288 STACKSHOT_FROM_PANIC = 0x400000, 289 STACKSHOT_NO_IO_STATS = 0x800000, 290 /* Report owners of and pointers to kernel objects that threads are blocked on */ 291 STACKSHOT_THREAD_WAITINFO = 0x1000000, 292 STACKSHOT_THREAD_GROUP = 0x2000000, 293 STACKSHOT_SAVE_JETSAM_COALITIONS = 0x4000000, 294 STACKSHOT_INSTRS_CYCLES = 0x8000000, 295 STACKSHOT_ASID = 0x10000000, 296 STACKSHOT_PAGE_TABLES = 0x20000000, 297 STACKSHOT_DISABLE_LATENCY_INFO = 0x40000000, 298 STACKSHOT_SAVE_DYLD_COMPACTINFO = 0x80000000, 299 STACKSHOT_INCLUDE_DRIVER_THREADS_IN_KERNEL = 0x100000000, 300 /* Include all Exclaves address space layouts, instead of just on-core ones (default) */ 301 STACKSHOT_EXCLAVES = 0x200000000, 302 /* Skip Exclaves stack collection */ 303 STACKSHOT_SKIP_EXCLAVES = 0x400000000, 304 STACKSHOT_MTEINFO = 0x800000000, 305 }); // Note: Add any new flags to kcdata.py (stackshot_in_flags) 306 307 __options_decl(microstackshot_flags_t, uint32_t, { 308 /* 309 * Collect and consume kernel thread microstackshots. 310 */ 311 STACKSHOT_GET_KERNEL_MICROSTACKSHOT = 0x0008, 312 /* 313 * Collect user thread microstackshots. 314 */ 315 STACKSHOT_GET_MICROSTACKSHOT = 0x0010, 316 /* 317 * Enable and disable are longer supported; use telemetry(2) instead. 318 */ 319 STACKSHOT_GLOBAL_MICROSTACKSHOT_ENABLE = 0x0020, 320 STACKSHOT_GLOBAL_MICROSTACKSHOT_DISABLE = 0x0040, 321 /* 322 * For user thread microstackshots, set a mark to consume the entries. 323 */ 324 STACKSHOT_SET_MICROSTACKSHOT_MARK = 0x0080, 325 }); 326 327 __options_decl(telemetry_notice_t, uint32_t, { 328 /* 329 * User space microstackshots should be read. 330 */ 331 TELEMETRY_NOTICE_BASE = 0x00, 332 /* 333 * Kernel microstackshots should be read. 334 */ 335 TELEMETRY_NOTICE_KERNEL_MICROSTACKSHOT = 0x01, 336 }); 337 338 #define STACKSHOT_THREAD_SNAPSHOT_MAGIC 0xfeedface 339 #define STACKSHOT_TASK_SNAPSHOT_MAGIC 0xdecafbad 340 #define STACKSHOT_MEM_AND_IO_SNAPSHOT_MAGIC 0xbfcabcde 341 #define STACKSHOT_MICRO_SNAPSHOT_MAGIC 0x31c54011 342 343 #define STACKSHOT_PAGETABLES_MASK_ALL ~0 344 345 __options_closed_decl(kf_override_flag_t, uint32_t, { 346 KF_SERIAL_OVRD = 0x2, 347 KF_PMAPV_OVRD = 0x4, 348 KF_MATV_OVRD = 0x8, 349 KF_STACKSHOT_OVRD = 0x10, 350 KF_COMPRSV_OVRD = 0x20, 351 KF_INTERRUPT_MASKED_DEBUG_OVRD = 0x40, 352 KF_TRAPTRACE_OVRD = 0x80, 353 KF_IOTRACE_OVRD = 0x100, 354 KF_INTERRUPT_MASKED_DEBUG_STACKSHOT_OVRD = 0x200, 355 KF_SCHED_HYGIENE_DEBUG_PMC_OVRD = 0x400, 356 KF_MACH_ASSERT_OVRD = 0x800, 357 KF_MADVISE_FREE_DEBUG_OVRD = 0x1000, 358 KF_DISABLE_FP_POPC_ON_PGFLT = 0x2000, 359 KF_DISABLE_PROD_TRC_VALIDATION = 0x4000, 360 KF_IO_TIMEOUT_OVRD = 0x8000, 361 KF_PREEMPTION_DISABLED_DEBUG_OVRD = 0x10000, 362 /* 363 * Disable panics (with retaining backtraces) on leaked proc refs across syscall boundary. 364 */ 365 KF_DISABLE_PROCREF_TRACKING_OVRD = 0x20000, 366 }); 367 368 #define KF_SERVER_PERF_MODE_OVRD ( \ 369 KF_SERIAL_OVRD | \ 370 KF_PMAPV_OVRD | \ 371 KF_MATV_OVRD | \ 372 KF_COMPRSV_OVRD | \ 373 KF_INTERRUPT_MASKED_DEBUG_OVRD | \ 374 KF_TRAPTRACE_OVRD | \ 375 KF_IOTRACE_OVRD | \ 376 KF_SCHED_HYGIENE_DEBUG_PMC_OVRD | \ 377 KF_MACH_ASSERT_OVRD | \ 378 KF_MADVISE_FREE_DEBUG_OVRD | \ 379 KF_DISABLE_PROD_TRC_VALIDATION | \ 380 0) 381 382 boolean_t kern_feature_override(kf_override_flag_t fmask); 383 384 __options_decl(eph_panic_flags_t, uint64_t, { 385 EMBEDDED_PANIC_HEADER_FLAG_COREDUMP_COMPLETE = 0x01, /* INFO: coredump completed */ 386 EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_SUCCEEDED = 0x02, /* INFO: stackshot completed */ 387 EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_DEBUGGERSYNC = 0x04, /* ERROR: stackshot failed to sync with external debugger */ 388 EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_ERROR = 0x08, /* ERROR: stackshot failed */ 389 EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_INCOMPLETE = 0x10, /* ERROR: stackshot is partially complete */ 390 EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_FAILED_NESTED = 0x20, /* ERROR: stackshot caused a nested panic */ 391 EMBEDDED_PANIC_HEADER_FLAG_NESTED_PANIC = 0x40, /* ERROR: panic handler encountered a panic */ 392 EMBEDDED_PANIC_HEADER_FLAG_BUTTON_RESET_PANIC = 0x80, /* INFO: force-reset panic: user held power button to force shutdown */ 393 EMBEDDED_PANIC_HEADER_FLAG_COMPANION_PROC_INITIATED_PANIC = 0x100, /* INFO: panic was triggered by a companion processor (external to the SOC) */ 394 EMBEDDED_PANIC_HEADER_FLAG_COREDUMP_FAILED = 0x200, /* ERROR: coredump failed to complete */ 395 EMBEDDED_PANIC_HEADER_FLAG_COMPRESS_FAILED = 0x400, /* ERROR: stackshot failed to compress */ 396 EMBEDDED_PANIC_HEADER_FLAG_STACKSHOT_DATA_COMPRESSED = 0x800, /* INFO: stackshot data is compressed */ 397 EMBEDDED_PANIC_HEADER_FLAG_ENCRYPTED_COREDUMP_SKIPPED = 0x1000, /* ERROR: coredump policy requires encryption, but encryptions is not initialized or available */ 398 EMBEDDED_PANIC_HEADER_FLAG_KERNEL_COREDUMP_SKIPPED_EXCLUDE_REGIONS_UNAVAILABLE = 0x2000, /* ERROR: coredump region exclusion list is not available */ 399 EMBEDDED_PANIC_HEADER_FLAG_COREFILE_UNLINKED = 0x4000, /* ERROR: coredump output file is not linked */ 400 EMBEDDED_PANIC_HEADER_FLAG_INCOHERENT_PANICLOG = 0x8000, /* ERROR: paniclog integrity check failed (a warning to consumer code i.e. DumpPanic) */ 401 EMBEDDED_PANIC_HEADER_FLAG_EXCLAVE_PANIC = 0x10000, /* INFO: panic originated from exclaves */ 402 EMBEDDED_PANIC_HEADER_FLAG_USERSPACE_INITIATED_PANIC = 0x20000, /* INFO: panic was initiated by userspace */ 403 EMBEDDED_PANIC_HEADER_FLAG_INTEGRATED_COPROC_INITIATED_PANIC = 0x40000, /* INFO: panic was initiated by an SOC-integrated coprocessor */ 404 }); 405 406 #define MAX_PANIC_INITIATOR_SIZE 256 407 408 #define EMBEDDED_PANIC_HEADER_CURRENT_VERSION 6 409 #define EMBEDDED_PANIC_MAGIC 0x46554E4B /* FUNK */ 410 #define EMBEDDED_PANIC_HEADER_OSVERSION_LEN 32 411 412 /* 413 * Any updates to this header should be also updated in astris as it can not 414 * grab this header from the SDK. 415 * 416 * NOTE: DO NOT REMOVE OR CHANGE THE MEANING OF ANY FIELDS FROM THIS STRUCTURE. 417 * Any modifications should add new fields at the end, bump the version number 418 * and be done alongside astris and DumpPanic changes. 419 */ 420 struct embedded_panic_header { 421 uint32_t eph_magic; /* EMBEDDED_PANIC_MAGIC if valid */ 422 uint32_t eph_crc; /* CRC of everything following the ph_crc in the header and the contents */ 423 uint32_t eph_version; /* embedded_panic_header version */ 424 eph_panic_flags_t eph_panic_flags; /* Flags indicating any state or relevant details */ 425 uint32_t eph_panic_log_offset; /* Offset of the beginning of the panic log from the beginning of the header */ 426 uint32_t eph_panic_log_len; /* length of the panic log */ 427 uint32_t eph_stackshot_offset; /* Offset of the beginning of the panic stackshot from the beginning of the header */ 428 uint32_t eph_stackshot_len; /* length of the panic stackshot (0 if not valid ) */ 429 uint32_t eph_other_log_offset; /* Offset of the other log (any logging subsequent to the stackshot) from the beginning of the header */ 430 uint32_t eph_other_log_len; /* length of the other log */ 431 union { 432 struct { 433 uint64_t eph_x86_power_state:8, 434 eph_x86_efi_boot_state:8, 435 eph_x86_system_state:8, 436 eph_x86_unused_bits:40; 437 }; // anonymous struct to group the bitfields together. 438 uint64_t eph_x86_do_not_use; /* Used for offsetof/sizeof when parsing header */ 439 } __attribute__((packed)); 440 char eph_os_version[EMBEDDED_PANIC_HEADER_OSVERSION_LEN]; 441 char eph_macos_version[EMBEDDED_PANIC_HEADER_OSVERSION_LEN]; 442 uuid_string_t eph_bootsessionuuid_string; /* boot session UUID */ 443 uint64_t eph_roots_installed; /* bitmap indicating which roots are installed on this system */ 444 uint32_t eph_ext_paniclog_offset; 445 uint32_t eph_ext_paniclog_len; 446 uint32_t eph_panic_initiator_offset; 447 uint32_t eph_panic_initiator_len; 448 } __attribute__((packed)); 449 450 451 #define MACOS_PANIC_HEADER_CURRENT_VERSION 3 452 #define MACOS_PANIC_MAGIC 0x44454544 /* DEED */ 453 454 __options_decl(mph_panic_flags_t, uint64_t, { 455 MACOS_PANIC_HEADER_FLAG_NESTED_PANIC = 0x01, /* ERROR: panic handler encountered a panic */ 456 MACOS_PANIC_HEADER_FLAG_COMPANION_PROC_INITIATED_PANIC = 0x02, /* INFO: panic was triggered by a companion processor (external to the SOC) */ 457 MACOS_PANIC_HEADER_FLAG_STACKSHOT_SUCCEEDED = 0x04, /* INFO: stackshot completed */ 458 MACOS_PANIC_HEADER_FLAG_STACKSHOT_DATA_COMPRESSED = 0x08, /* INFO: stackshot data is compressed */ 459 MACOS_PANIC_HEADER_FLAG_STACKSHOT_FAILED_DEBUGGERSYNC = 0x10, /* ERROR: stackshot failed to sync with external debugger */ 460 MACOS_PANIC_HEADER_FLAG_STACKSHOT_FAILED_ERROR = 0x20, /* ERROR: stackshot failed */ 461 MACOS_PANIC_HEADER_FLAG_STACKSHOT_FAILED_INCOMPLETE = 0x40, /* ERROR: stackshot is partially complete */ 462 MACOS_PANIC_HEADER_FLAG_STACKSHOT_FAILED_NESTED = 0x80, /* ERROR: stackshot caused a nested panic */ 463 MACOS_PANIC_HEADER_FLAG_COREDUMP_COMPLETE = 0x100, /* INFO: coredump completed */ 464 MACOS_PANIC_HEADER_FLAG_COREDUMP_FAILED = 0x200, /* ERROR: coredump failed to complete */ 465 MACOS_PANIC_HEADER_FLAG_STACKSHOT_KERNEL_ONLY = 0x400, /* ERROR: stackshot contains only kernel data (e.g. due to space limitations) */ 466 MACOS_PANIC_HEADER_FLAG_STACKSHOT_FAILED_COMPRESS = 0x800, /* ERROR: stackshot failed to compress */ 467 MACOS_PANIC_HEADER_FLAG_ENCRYPTED_COREDUMP_SKIPPED = 0x1000, /* ERROR: coredump policy requires encryption, but encryptions is not initialized or available */ 468 MACOS_PANIC_HEADER_FLAG_KERNEL_COREDUMP_SKIPPED_EXCLUDE_REGIONS_UNAVAILABLE = 0x2000, /* ERROR: coredump region exclusion list is not available */ 469 MACOS_PANIC_HEADER_FLAG_COREFILE_UNLINKED = 0x4000, /* ERROR: coredump output file is not linked */ 470 MACOS_PANIC_HEADER_FLAG_INCOHERENT_PANICLOG = 0x8000, /* ERROR: paniclog integrity check failed (a warning to consumer code i.e. DumpPanic) */ 471 MACOS_PANIC_HEADER_FLAG_USERSPACE_INITIATED_PANIC = 0x10000, /* INFO: panic was initiated by userspace */ 472 MACOS_PANIC_HEADER_FLAG_INTEGRATED_COPROC_INITIATED_PANIC = 0x20000, /* INFO: panic was initiated by an SOC-integrated coprocessor */ 473 }); 474 475 struct macos_panic_header { 476 uint32_t mph_magic; /* MACOS_PANIC_MAGIC if valid */ 477 uint32_t mph_crc; /* CRC of everything following mph_crc in the header and the contents */ 478 uint32_t mph_version; /* macos_panic_header version */ 479 uint32_t mph_padding; /* unused */ 480 mph_panic_flags_t mph_panic_flags; /* Flags indicating any state or relevant details */ 481 uint32_t mph_panic_log_offset; /* Offset of the panic log from the beginning of the header */ 482 uint32_t mph_panic_log_len; /* length of the panic log */ 483 uint32_t mph_stackshot_offset; /* Offset of the panic stackshot from the beginning of the header */ 484 uint32_t mph_stackshot_len; /* length of the panic stackshot */ 485 uint32_t mph_other_log_offset; /* Offset of the other log (any logging subsequent to the stackshot) from the beginning of the header */ 486 uint32_t mph_other_log_len; /* length of the other log */ 487 uint64_t mph_roots_installed; /* bitmap indicating which roots are installed on this system */ 488 char mph_data[]; /* panic data -- DO NOT ACCESS THIS FIELD DIRECTLY. Use the offsets above relative to the beginning of the header */ 489 } __attribute__((packed)); 490 491 /* 492 * Any change to the below structure should mirror the structure defined in MacEFIFirmware 493 * (and vice versa) 494 */ 495 496 struct efi_aurr_panic_header { 497 uint32_t efi_aurr_magic; 498 uint32_t efi_aurr_crc; 499 uint32_t efi_aurr_version; 500 uint32_t efi_aurr_reset_cause; 501 uint32_t efi_aurr_reset_log_offset; 502 uint32_t efi_aurr_reset_log_len; 503 char efi_aurr_panic_data[]; 504 } __attribute__((packed)); 505 506 /* 507 * EXTENDED_/DEBUG_BUF_SIZE can't grow without updates to SMC and iBoot to store larger panic logs on co-processor systems 508 */ 509 #define EXTENDED_DEBUG_BUF_SIZE 0x0013ff80 510 511 #define EFI_AURR_PANIC_STRING_MAX_LEN 112 512 #define EFI_AURR_EXTENDED_LOG_SIZE (EXTENDED_DEBUG_BUF_SIZE - sizeof(struct efi_aurr_panic_header) - EFI_AURR_PANIC_STRING_MAX_LEN) 513 514 struct efi_aurr_extended_panic_log { 515 char efi_aurr_extended_log_buf[EFI_AURR_EXTENDED_LOG_SIZE]; 516 uint32_t efi_aurr_log_tail; /* Circular buffer indices */ 517 uint32_t efi_aurr_log_head; /* ditto.. */ 518 } __attribute__((packed)); 519 520 #endif /* __APPLE_API_UNSTABLE */ 521 #endif /* __APPLE_API_PRIVATE */ 522 523 /* 524 * If non-zero, this physical address had an ECC error that led to a panic. 525 */ 526 extern uint64_t ecc_panic_physical_address; 527 528 #ifdef KERNEL_PRIVATE 529 #if DEBUG 530 #ifndef DKPR 531 #define DKPR 1 532 #endif 533 #endif 534 535 #if DKPR 536 /* 537 * For the DEBUG kernel, support the following: 538 * sysctl -w debug.kprint_syscall=<syscall_mask> 539 * sysctl -w debug.kprint_syscall_process=<p_comm> 540 * <syscall_mask> should be an OR of the masks below 541 * for UNIX, MACH, MDEP, or IPC. This debugging aid 542 * assumes the task/process is locked/wired and will 543 * not go away during evaluation. If no process is 544 * specified, all processes will be traced 545 */ 546 extern int debug_kprint_syscall; 547 extern int debug_kprint_current_process(const char **namep); 548 #define DEBUG_KPRINT_SYSCALL_PREDICATE_INTERNAL(mask, namep) \ 549 ( (debug_kprint_syscall & (mask)) && debug_kprint_current_process(namep) ) 550 #define DEBUG_KPRINT_SYSCALL_MASK(mask, fmt, args...) do { \ 551 const char *dks_name = NULL; \ 552 if (DEBUG_KPRINT_SYSCALL_PREDICATE_INTERNAL(mask, &dks_name)) { \ 553 kprintf("[%s%s%p]" fmt, dks_name ? dks_name : "", \ 554 dks_name ? "@" : "", current_thread(), args); \ 555 } \ 556 } while (0) 557 #else /* !DEBUG */ 558 #define DEBUG_KPRINT_SYSCALL_PREDICATE_INTERNAL(mask, namep) (0) 559 #define DEBUG_KPRINT_SYSCALL_MASK(mask, fmt, args...) do { } while (0) /* kprintf(fmt, args) */ 560 #endif /* !DEBUG */ 561 562 enum { 563 DEBUG_KPRINT_SYSCALL_UNIX_MASK = 1 << 0, 564 DEBUG_KPRINT_SYSCALL_MACH_MASK = 1 << 1, 565 DEBUG_KPRINT_SYSCALL_MDEP_MASK = 1 << 2, 566 DEBUG_KPRINT_SYSCALL_IPC_MASK = 1 << 3 567 }; 568 569 #define DEBUG_KPRINT_SYSCALL_PREDICATE(mask) \ 570 DEBUG_KPRINT_SYSCALL_PREDICATE_INTERNAL(mask, NULL) 571 #define DEBUG_KPRINT_SYSCALL_UNIX(fmt, args...) \ 572 DEBUG_KPRINT_SYSCALL_MASK(DEBUG_KPRINT_SYSCALL_UNIX_MASK,fmt,args) 573 #define DEBUG_KPRINT_SYSCALL_MACH(fmt, args...) \ 574 DEBUG_KPRINT_SYSCALL_MASK(DEBUG_KPRINT_SYSCALL_MACH_MASK,fmt,args) 575 #define DEBUG_KPRINT_SYSCALL_MDEP(fmt, args...) \ 576 DEBUG_KPRINT_SYSCALL_MASK(DEBUG_KPRINT_SYSCALL_MDEP_MASK,fmt,args) 577 #define DEBUG_KPRINT_SYSCALL_IPC(fmt, args...) \ 578 DEBUG_KPRINT_SYSCALL_MASK(DEBUG_KPRINT_SYSCALL_IPC_MASK,fmt,args) 579 580 /* Debug boot-args */ 581 #define DB_HALT 0x1 582 #define DB_PRT 0x2 // enable always-on panic print to serial 583 #define DB_NMI 0x4 584 #define DB_KPRT 0x8 585 #define DB_KDB 0x10 586 #define DB_ARP 0x40 587 #define DB_KDP_BP_DIS 0x80 588 //#define DB_LOG_PI_SCRN 0x100 -- obsolete 589 #define DB_KDP_GETC_ENA 0x200 590 591 #define DB_KERN_DUMP_ON_PANIC 0x400 /* Trigger core dump on panic*/ 592 #define DB_KERN_DUMP_ON_NMI 0x800 /* Trigger core dump on NMI */ 593 #define DB_DBG_POST_CORE 0x1000 /*Wait in debugger after NMI core */ 594 #define DB_PANICLOG_DUMP 0x2000 /* Send paniclog on panic,not core*/ 595 #define DB_REBOOT_POST_CORE 0x4000 /* Attempt to reboot after 596 * post-panic crashdump/paniclog 597 * dump. 598 */ 599 #define DB_NMI_BTN_ENA 0x8000 /* Enable button to directly trigger NMI */ 600 /* 0x10000 was DB_PRT_KDEBUG (kprintf kdebug events), feature removed */ 601 #define DB_DISABLE_LOCAL_CORE 0x20000 /* ignore local kernel core dump support */ 602 #define DB_DISABLE_GZIP_CORE 0x40000 /* don't gzip kernel core dumps */ 603 #define DB_DISABLE_CROSS_PANIC 0x80000 /* x86 only - don't trigger cross panics. Only 604 * necessary to enable x86 kernel debugging on 605 * configs with a dev-fused co-processor running 606 * release bridgeOS. 607 */ 608 #define DB_REBOOT_ALWAYS 0x100000 /* Don't wait for debugger connection */ 609 #define DB_DISABLE_STACKSHOT_TO_DISK 0x200000 /* Disable writing stackshot to local disk */ 610 #define DB_DEBUG_IP_INIT 0x400000 /* iBoot specific: Allow globally enabling debug IPs during init */ 611 #define DB_SOC_HALT_ENABLE 0x800000 /* iBoot specific: Enable SoC Halt during init */ 612 613 /* 614 * Values for a 64-bit mask that's passed to the debugger. 615 */ 616 #define DEBUGGER_OPTION_NONE 0x0ULL 617 #define DEBUGGER_OPTION_PANICLOGANDREBOOT 0x1ULL /* capture a panic log and then reboot immediately */ 618 #define DEBUGGER_OPTION_INITPROC_PANIC 0x20ULL 619 #define DEBUGGER_OPTION_COMPANION_PROC_INITIATED_PANIC 0x40ULL /* panic triggered by a companion processor (external to the SOC) */ 620 #define DEBUGGER_OPTION_SKIP_LOCAL_COREDUMP 0x80ULL /* don't try to save local coredumps for this panic */ 621 #define DEBUGGER_OPTION_ATTEMPTCOREDUMPANDREBOOT 0x100ULL /* attempt to save coredump. always reboot */ 622 #define DEBUGGER_INTERNAL_OPTION_THREAD_BACKTRACE 0x200ULL /* backtrace the specified thread in the paniclog (x86 only) */ 623 #define DEBUGGER_OPTION_PRINT_CPU_USAGE_PANICLOG 0x400ULL /* print extra CPU usage data in the panic log */ 624 #define DEBUGGER_OPTION_SKIP_PANICEND_CALLOUTS 0x800ULL /* (bridgeOS) skip the kPEPanicEnd callouts -- don't wait for x86 to finish sending panic data */ 625 #define DEBUGGER_OPTION_SYNC_ON_PANIC_UNSAFE 0x1000ULL /* sync() early in Panic - Can add unbounded delay, may be unsafe for some panic scenarios. Intended for userspace, watchdogs and RTBuddy panics */ 626 #define DEBUGGER_OPTION_USERSPACE_INITIATED_PANIC 0x2000ULL /* panic initiated by userspace */ 627 #define DEBUGGER_OPTION_INTEGRATED_COPROC_INITIATED_PANIC 0x4000ULL /* panic initiated by an SOC-integrated coprocessor */ 628 #define DEBUGGER_OPTION_USER_WATCHDOG 0x8000ULL /* A watchdog panic caused by an unresponsive user daemon */ 629 630 #define DEBUGGER_INTERNAL_OPTIONS_MASK (DEBUGGER_INTERNAL_OPTION_THREAD_BACKTRACE) 631 632 #define __STRINGIFY(x) #x 633 #define LINE_NUMBER(x) __STRINGIFY(x) 634 #ifdef __FILE_NAME__ 635 #define PANIC_LOCATION __FILE_NAME__ ":" LINE_NUMBER(__LINE__) 636 #else 637 #define PANIC_LOCATION __FILE__ ":" LINE_NUMBER(__LINE__) 638 #define __FILE_NAME__ __FILE__ 639 #endif 640 641 struct task; 642 struct thread; 643 struct proc; 644 645 void Debugger(const char * message); 646 void populate_model_name(char *); 647 648 boolean_t panic_validate_ptr(void *ptr, vm_size_t size, const char *what); 649 650 boolean_t panic_get_thread_proc_task(struct thread *thread, struct task **task, struct proc **proc); 651 652 #define PANIC_VALIDATE_PTR(expr) \ 653 panic_validate_ptr(expr, sizeof(*(expr)), #expr) 654 655 656 #if defined(__arm__) || defined(__arm64__) 657 /* Note that producer_name and buf should never be de-allocated as we reference these during panic */ 658 void register_additional_panic_data_buffer(const char *producer_name, void *buf, int len); 659 #endif 660 661 unsigned panic_active(void); 662 663 #endif /* KERNEL_PRIVATE */ 664 665 #if XNU_KERNEL_PRIVATE 666 667 /* limit the max size to a reasonable length */ 668 #define ADDITIONAL_PANIC_DATA_BUFFER_MAX_LEN 64 669 670 struct additional_panic_data_buffer { 671 const char *producer_name; 672 void *buf; 673 int len; 674 }; 675 676 typedef struct kernel_panic_reason { 677 char buf[1024]; 678 } *kernel_panic_reason_t; 679 PERCPU_DECL(struct kernel_panic_reason, panic_reason); 680 681 extern struct additional_panic_data_buffer *panic_data_buffers; 682 683 boolean_t oslog_is_safe(void); 684 boolean_t debug_mode_active(void); 685 boolean_t stackshot_active(void); 686 void panic_stackshot_reset_state(void); 687 688 /* 689 * @function stack_snapshot_from_kernel 690 * 691 * @abstract Stackshot function for kernel consumers who have their own buffer. 692 * 693 * @param pid the PID to be traced or -1 for the whole system 694 * @param buf a pointer to the buffer where the stackshot should be written 695 * @param size the size of the buffer 696 * @param flags flags to be passed to the stackshot 697 * @param delta_since_timestamp start time for delta period 698 * @param pagetable_mask if pagetable dumping is set in flags, the mask of page table levels to dump 699 * @bytes_traced a pointer to be filled with the length of the stackshot 700 * 701 */ 702 kern_return_t 703 stack_snapshot_from_kernel(int pid, void *buf, uint32_t size, uint64_t flags, 704 uint64_t delta_since_timestamp, uint32_t pagetable_mask, unsigned *bytes_traced); 705 706 /* 707 * Returns whether on device corefiles are enabled based on the build 708 * and boot configuration. 709 */ 710 boolean_t on_device_corefile_enabled(void); 711 712 /* 713 * Returns whether panic stackshot to disk is enabled based on the build 714 * and boot configuration. 715 */ 716 boolean_t panic_stackshot_to_disk_enabled(void); 717 718 #if defined(__x86_64__) 719 extern char debug_buf[]; 720 extern boolean_t coprocessor_paniclog_flush; 721 extern boolean_t extended_debug_log_enabled; 722 #endif /* defined(__x86_64__) */ 723 724 extern char *debug_buf_base; 725 726 #if defined(XNU_TARGET_OS_BRIDGE) 727 extern uint64_t macos_panic_base; 728 extern unsigned int macos_panic_size; 729 #endif /* defined(XNU_TARGET_OS_BRIDGE) */ 730 731 extern char kernel_uuid_string[]; 732 extern char panic_disk_error_description[]; 733 extern size_t panic_disk_error_description_size; 734 735 extern unsigned char *__counted_by(sizeof(uuid_t)) kernel_uuid; 736 extern unsigned int debug_boot_arg; 737 extern unsigned int verbose_panic_flow_logging; 738 739 extern boolean_t kernelcache_uuid_valid; 740 extern uuid_t kernelcache_uuid; 741 extern uuid_string_t kernelcache_uuid_string; 742 743 extern boolean_t pageablekc_uuid_valid; 744 extern uuid_t pageablekc_uuid; 745 extern uuid_string_t pageablekc_uuid_string; 746 747 extern boolean_t auxkc_uuid_valid; 748 extern uuid_t auxkc_uuid; 749 extern uuid_string_t auxkc_uuid_string; 750 751 extern boolean_t doprnt_hide_pointers; 752 753 extern unsigned int halt_in_debugger; /* pending halt in debugger after boot */ 754 extern unsigned int current_debugger; 755 #define NO_CUR_DB 0x0 756 #define KDP_CUR_DB 0x1 757 758 extern unsigned int active_debugger; 759 extern unsigned int kernel_debugger_entry_count; 760 761 extern unsigned int panicDebugging; 762 763 extern const char *debugger_panic_str; 764 765 extern char *debug_buf_ptr; 766 extern unsigned int debug_buf_size; 767 768 extern void debug_log_init(void); 769 extern void debug_putc(char); 770 extern boolean_t debug_is_current_cpu_in_panic_state(void); 771 772 /* 773 * Initialize the physical carveout requested with the `phys_carveout_mb` 774 * boot-arg. This should only be called at kernel startup, when physically 775 * contiguous pages are plentiful. 776 */ 777 extern void phys_carveout_init(void); 778 779 /* 780 * Check whether a kernel virtual address points within the physical carveout. 781 */ 782 extern boolean_t debug_is_in_phys_carveout(vm_map_offset_t va); 783 784 /* 785 * Check whether the physical carveout should be included in a coredump. 786 */ 787 extern boolean_t debug_can_coredump_phys_carveout(void); 788 789 extern vm_offset_t phys_carveout; 790 extern uintptr_t phys_carveout_pa; 791 extern size_t phys_carveout_size; 792 793 extern boolean_t kernel_debugging_restricted(void); 794 795 #if defined (__x86_64__) 796 extern void extended_debug_log_init(void); 797 798 int packA(char *inbuf, uint32_t length, uint32_t buflen); 799 void unpackA(char *inbuf, uint32_t length); 800 801 #define PANIC_STACKSHOT_BUFSIZE (1024 * 1024) 802 803 extern uintptr_t panic_stackshot_buf; 804 extern size_t panic_stackshot_buf_len; 805 806 extern size_t panic_stackshot_len; 807 #endif /* defined (__x86_64__) */ 808 809 void SavePanicInfo(const char *message, void *panic_data, uint64_t panic_options, const char* panic_initiator); 810 void print_curr_backtrace(void); 811 void paniclog_flush(void); 812 void panic_display_zalloc(void); /* in zalloc.c */ 813 void panic_display_kernel_aslr(void); 814 void panic_display_hibb(void); 815 void panic_display_model_name(void); 816 void panic_display_kernel_uuid(void); 817 void panic_display_process_name(void); 818 void panic_print_symbol_name(vm_address_t search); 819 #if CONFIG_ECC_LOGGING 820 void panic_display_ecc_errors(void); 821 #endif /* CONFIG_ECC_LOGGING */ 822 void panic_display_compressor_stats(void); 823 824 struct mach_assert_hdr; 825 void panic_assert_format(char *buf, size_t len, struct mach_assert_hdr *hdr, long a, long b); 826 827 /* 828 * @var not_in_kdp 829 * 830 * @abstract True if we're in normal kernel operation, False if we're in a 831 * single-core debugger context. 832 */ 833 extern unsigned int not_in_kdp; 834 835 #define DEBUGGER_NO_CPU -1 836 837 typedef enum { 838 DBOP_NONE, 839 DBOP_STACKSHOT, 840 DBOP_RESET_PGO_COUNTERS, 841 DBOP_PANIC, 842 DBOP_DEBUGGER, 843 DBOP_BREAKPOINT, 844 } debugger_op; 845 846 __printflike(3, 0) 847 kern_return_t DebuggerTrapWithState(debugger_op db_op, const char *db_message, const char *db_panic_str, va_list *db_panic_args, 848 uint64_t db_panic_options, void *db_panic_data_ptr, boolean_t db_proceed_on_sync_failure, unsigned long db_panic_caller, const char *db_panic_initiator); 849 void handle_debugger_trap(unsigned int exception, unsigned int code, unsigned int subcode, void *state); 850 851 void DebuggerWithContext(unsigned int reason, void *ctx, const char *message, uint64_t debugger_options_mask, unsigned long debugger_caller); 852 853 const char *sysctl_debug_get_preoslog(size_t *size); 854 void sysctl_debug_free_preoslog(void); 855 856 #if DEBUG || DEVELOPMENT 857 /* leak pointer scan definitions */ 858 859 enum{ 860 kInstanceFlagAddress = 0x01UL, 861 kInstanceFlagReferenced = 0x02UL, 862 kInstanceFlags = 0x03UL 863 }; 864 865 #define INSTANCE_GET(x) ((x) & ~kInstanceFlags) 866 #define INSTANCE_PUT(x) ((x) ^ ~kInstanceFlags) 867 868 typedef void (^leak_site_proc)(uint32_t siteCount, uint32_t elem_size, uint32_t btref); 869 870 extern kern_return_t 871 zone_leaks(const char * zoneName, uint32_t nameLen, leak_site_proc proc); 872 873 extern void 874 zone_leaks_scan(uintptr_t * instances, uint32_t count, uint32_t zoneSize, uint32_t * found); 875 876 /* panic testing hooks */ 877 878 #define PANIC_TEST_CASE_DISABLED 0 879 #define PANIC_TEST_CASE_RECURPANIC_ENTRY 0x2 // recursive panic at panic entrypoint, before panic data structures are initialized 880 #define PANIC_TEST_CASE_RECURPANIC_PRELOG 0x4 // recursive panic prior to paniclog being written 881 #define PANIC_TEST_CASE_RECURPANIC_POSTLOG 0x8 // recursive panic after paniclog has been written 882 #define PANIC_TEST_CASE_RECURPANIC_POSTCORE 0x10 // recursive panic after corefile has been written 883 #define PANIC_TEST_CASE_COREFILE_IO_ERR 0x20 // single IO error in the corefile write path 884 #define PANIC_TEST_CASE_HIBERNATION_ENTRY 0x40 // panic on hibernation entry 885 extern unsigned int panic_test_case; 886 887 #define PANIC_TEST_FAILURE_MODE_BADPTR 0x1 // dereference a bad pointer 888 #define PANIC_TEST_FAILURE_MODE_SPIN 0x2 // spin until watchdog kicks in 889 #define PANIC_TEST_FAILURE_MODE_PANIC 0x4 // explicit panic 890 extern unsigned int panic_test_failure_mode; // panic failure mode 891 892 extern unsigned int panic_test_action_count; // test parameter, depends on test case 893 894 #endif /* DEBUG || DEVELOPMENT */ 895 896 /* 897 * A callback that reads or writes data from a given offset into the corefile. It is understood that this 898 * callback should only be used from within the context where it is given. It should never be stored and 899 * reused later on. 900 */ 901 typedef kern_return_t (*IOCoreFileAccessCallback)(void *context, boolean_t write, uint64_t offset, int length, void *buffer); 902 903 /* 904 * A callback that receives temporary file-system access to the kernel corefile 905 * 906 * Parameters: 907 * - access: A function to call for reading/writing the kernel corefile. 908 * - access_context: The context that should be passed to the 'access' function. 909 * - recipient_context: The recipient-specific context. Can be anything. 910 */ 911 typedef kern_return_t (*IOCoreFileAccessRecipient)(IOCoreFileAccessCallback access, void *access_context, void *recipient_context); 912 913 /* 914 * Provides safe and temporary file-system access to the kernel corefile to the given recipient callback. 915 * It does so by opening the kernel corefile, then calling the 'recipient' callback, passing it an IOCoreFileAccessCallback 916 * function that it can use to read/write data, then closing the kernel corefile as soon as the recipient returns. 917 * 918 * Parameters: 919 * - recipient: A function to call, providing it access to the kernel corefile. 920 * - recipient_context: Recipient-specific context. Can be anything. 921 */ 922 extern kern_return_t 923 IOProvideCoreFileAccess(IOCoreFileAccessRecipient recipient, void *recipient_context); 924 925 struct kdp_core_encryption_key_descriptor { 926 uint64_t kcekd_format; 927 uint16_t kcekd_size; 928 void * kcekd_key; 929 }; 930 931 /* 932 * Registers a new kernel (and co-processor) coredump encryption key. The key format should be one of the 933 * supported "next" key formats in mach_debug_types.h. The recipient context pointer should point to a kdp_core_encryption_key_descriptor 934 * structure. 935 * 936 * Note that the given key pointer should be allocated using `kmem_alloc(kernel_map, <pointer>, <size>, VM_KERN_MEMORY_DIAG)` 937 * 938 * Note that upon successful completion, this function will adopt the given public key pointer 939 * and the caller should NOT release it. 940 */ 941 kern_return_t kdp_core_handle_new_encryption_key(IOCoreFileAccessCallback access_data, void *access_context, void *recipient_context); 942 943 /* 944 * Enum of allowed values for the 'lbr_support' boot-arg 945 */ 946 typedef enum { 947 LBR_ENABLED_NONE, 948 LBR_ENABLED_USERMODE, 949 LBR_ENABLED_KERNELMODE, 950 LBR_ENABLED_ALLMODES 951 } lbr_modes_t; 952 953 extern lbr_modes_t last_branch_enabled_modes; 954 955 /* Exclaves stackshot tests support */ 956 #define STACKSHOT_EXCLAVES_TESTING ((DEVELOPMENT || DEBUG) && CONFIG_EXCLAVES) 957 958 #if CONFIG_SPTM && (DEVELOPMENT || DEBUG) 959 struct panic_lockdown_initiator_state { 960 /** The PC from which panic lockdown was initiated. */ 961 uint64_t initiator_pc; 962 /** The SP from which panic lockdown was initiated. */ 963 uint64_t initiator_sp; 964 /** The TPIDR of the initiating CPU. */ 965 uint64_t initiator_tpidr; 966 /** The MPIDR of the initating CPU. */ 967 uint64_t initiator_mpidr; 968 969 /** The timestamp (from CNTVCT_EL0) at which panic lockdown was initiated. */ 970 uint64_t timestamp; 971 972 /* 973 * Misc. exception information. 974 */ 975 uint64_t esr; 976 uint64_t elr; 977 uint64_t far; 978 }; 979 980 /** Attempt to record debug state for a panic lockdown event */ 981 extern void panic_lockdown_record_debug_data(void); 982 #endif /* CONFIG_SPTM && (DEVELOPMENT || DEBUG) */ 983 984 #endif /* XNU_KERNEL_PRIVATE */ 985 986 __END_DECLS 987 988 #endif /* _KERN_DEBUG_H_ */ 989